MATERIAL DESIGN AWARDS 2016 BY GOOGLE

Material Design AWARDS 2016 BY GOOGLE

A design system only comes into existence when it’s used to create meaningful experiences. Last year, Google has introduced the Material Design Awards to recognize best-in-class achievements in employing Material Design. At Google I/O 2016, Robinhood was presented with the Google Play Award for Best Use of Material Design, Google wants to continue recognizing the makers who are helping to provide the next generation of Material Design.

This year Google is proud to announce the winners of the second annual Material Design Awards. Whereas the last year winners are highlighted in specific aspects of Material Design used in creating apps which satisfy the users while aptly expressing their brand. The five winners have been honoured at the SPAN LA conference on October 27, representing the finest application of aspects of Material Design.

THE TOP FIVE WINNERS ARE AS FOLLOWS :
Asana: Team Tasks & Projects by Asana, Inc.

An application built on making team more productive and collaborative which is visually focused and clear to keep the users concentrated on getting work done in time. Asana achieves this by polishing short, frequently repeated interactions to make efficiency feel rewarding. The content is never submerged by the wide range of actions because they are organized brilliantly and are very easy to trigger.

Asana’s design team has worked with the brand experience at every turn. Tenuous gradients are applied to the floating action button, as well as in moments of more casually paced user communication. The product logo is resonated in the circular outlines around icons which shows up while editing a task.

FABULOUS – MOTIVATE ME!BY THEFABULOUS

It’s always hard to rewire the brain and to adopt a routine, but it can be made easier with a perspective coach from your side. The Fabulous app a self-described “happiness trainer” that helps you to make a positive choice.

The application’s has the most charming illustration style which makes an instant impression. The crisp state transitions and pleasing goal completion animations keeps up the motivation— the experiences beyond the application functionality are keenly considered, with bold notifications style and with a good soundscape.

C CHANNEL BY C CHANNEL CORPORATION

When it comes to designing an application navigation, higher content usually means higher problems. Search often becomes a primary mode of exploration. The C Channel application clearly balances a blend of studio-created and user-submitted videos which is related to fashion, food, and much more.

Material Design AWARDS 2016

C Channel organizes the content into a series of tabs that can be seen easily with a simple swipe.

KITCHEN STORIES BY KITCHEN STORIES

Kitchen Stories shines in creating effective, easy-to-check layouts for recipes across a variety of screens and sizes. Home cooks will be more excited to have their tablets in the kitchen: content is organized smartly, there is no need of touching the screen with messy fingers. Kitchen stories is grabbing the attention through other moments in the application such as precise positioning for the playful use of the logo as a textural element on background surfaces.

AIRBNB BY AIRBNB,INC.

In Airbnb, the essential tasks are satisfied through clear design, routing users clearly and quickly from sign in, to browsing, and booking a reservation. They have clearly segmented the larger goals into smaller steps. Airbnb’s visual appeal is at the point. Photography is clear and communicates a sense of opportunity in each new destination.

AIRBNB BY AIRBNB

WHAT IS RANSOMWARE

What Is Ransomware

Ransomware

Ransomware is a form of malware that encrypts files on an affected device and holds their hostage until the user pays a ransom to the malware operators. Millions of dollars have been extracted through ransomware attacks, the most common strains of ransomware includes Cryptolocker, Cryptowall, Locky, and Samas or Samsam.

In this article, we have explained what is ransomware and how to protect against ransomware attacks.

WHAT IS RANSOMWARE

Ransomware commonly enters devices as a Trojan, impersonating as a normal file that is downloaded intentionally or unintentionally by the user. Upon execution, ransomware starts encrypting the files on an infected device and consistently displays a message informing the victim that their files can only be decrypted if a ransom amount is paid to the attackers. The user is provoked into paying the operators, who may or may not supply a code or program to decrypt the files. If the user fails to pay the ransom within the certain time period provided can result in an increased ransom amount or deletion of the encrypted files. The most dangerous types of ransomware are those were only the creators of the program have access to decrypt the key. Ransoms are typically paid in Bitcoin or other digital currencies that are difficult to trace.

THE COMMON TYPES OF RANSOMWARE STRAINS:
CRYPTOLOCKER

CryptoLocker was discovered on September 15, 2013, and is considered to be the first modern strain of ransomware. It is distributed through email attachments in order to encrypt files on Windows computers and any mounted drives. Even though CryptoLocker itself is easy to remove from infected devices, the files remains encrypted, and the only viable way to access files is to pay the ransom requested by the cyber criminals. Payment for the decryption of the key is taken in the form of Bitcoin or pre-paid cash vouchers.

CRYPTOWALL

CryptoWall was discovered on June 19, 2014, and it is related to CryptoLocker in some form. It has gone through a multiple number of releases with different names and has not yet been secluded. Initially, it was distributed through exploit kits and emails but recently it has been connected with malicious ads and compromised websites as well. CryptoWall encrypts the files and deletes any VSS or shadow copies to prevent data recovery. After infecting, the computer displays a web page or a text document that provides the directions for payment to the user.

SAMAS/SAMSAM/SAMSA

Samas, perhaps the most destructive form of ransomware, was first discovered on December 9, 2015. The code for Samas is not very advanced, but the methods of distribution are more focused than other attacks. Cybercriminals will first identify specific networks that have unpatched servers running JBoss enterprise products. Once they get the access, the operators will move parallel from the entry point to identify more hosts. The ransomware is manually installed once enough systems have been violated. Like CryptoWall, Samas will delete the outlined copies after encrypting the original files and demand payment in the form of Bitcoin. Unlike previous strains, the majority of Sama’s attacks have focused on hospitals, schools, and other networks with a stock of sensitive information that can be sold for a greater profit.

SAMAS_SAMSAM_SAMSA

BEST PRACTICES FOR RANSOMWARE PROTECTION

Always back up your files regularly: Having assiduous data backup processes in place can limit the damage caused by a ransomware attack significantly, as the encrypted data can be restored without paying a ransom.

Do not click on any email attachments or links from unconfirmed sources: Email is the most popular medium for phishing attacks that distribute ransomware or other malware through infected attachments or links to spiteful websites.

Disable Autorun for all mounted devices: Disabling the autorun will prevent malware from being able to spread individually.

Disable remote desktop connections when possible: Disabling this feature will block the attackers or malware from being able to access user’s devices and files remotely.

Log-in as the only administrator: Limit administrator allowances and the use of admin accounts whenever it is possible, to ensure that a user that has been compromised isn’t inadvertently granting administrative privileges to an attacker who has already gained access to their account.

Awareness and education in an organizations are the key for protecting against ransomware attacks. By educating yourself and your users on basic protection practices and keeping up with current security threats, you may reduce the risk of ransomware and keep your data safe.

HOW SPARK ON AWS HELPS BIG DATA

How Spark on AWS helps Big Data

WHAT SPARK IS ABOUT

Apache Spark is an open-source big data processing framework built around speed, easy to use, and sophisticated analytics. It was first developed in 2009 in UC Berkeley’s AMPLab, and open sourced in 2010 as an Apache project.

Spark has many advantages compared to other Big Data and MapReduce technologies like Hadoop and Storm.

Firstly, Spark gives us a comprehensive, united framework to manage big data processing requirements with a wide variety of data sets that are diverse in nature.

Spark endows applications in Hadoop clusters to run 100 times faster in memory and 10 times faster even when running on disk. Spark lets the user to quickly write the applications in Java, Scala, or Python.

FEATURES OF SPARK

Spark takes MapReduce to the next level with reasonable shuffles in the data processing. With capabilities like in-memory data storage and real-time processing, the performance is several times faster than the other big data technologies.

Spark also supports the assessment of big data queries, which helps in optimizing the steps in data processing workflows. It also provides a higher level API to improve the developer’s productivity and a consistent architect model for big data solutions.

Spark holds intermediate results in memory rather than writing them in disk which is very useful especially when the user needs to work on the same dataset for multiple times. Spark operators and performs external operations when data does not fit in the memory.

Spark will try to store as much as data in memory and then will discharge it to the disk. It can also store part of the data set in memory and the remaining data on the disk. The developer has to look at their data and use cases to estimate the memory requirements.

OTHER SPARK FEATURES INCLUDE

– It supports more than Map and Reduce functions.
– It optimizes arbitrary operator graphs.
-It also provides brief and consistent API’s in Scala, Java, and Python.

SPARK’S ECOSYSTEM

Other than Spark API, there are some additional libraries which are a part of the Spark ecosystem and provides some additional capabilities in Big Data analytics.

The libraries includes:
SPARK STREAMING

Spark Streaming can be used for processing the real-time data streaming. This is completely based on the micro batch style of computing and processing. It uses the DStream which is a series of RDDs, to process the real-time data.

SPARK SQL

Spark SQL provides the capability to disclose the Spark datasets over JDBC API and allows running the SQL queries on Spark data by using traditional BI and visualization tools. Spark SQL allows the developer to ETL their data from different sources and transforms it and exposes it for ad-hoc querying.

SPARK MLLIB

MLlib in Spark is an extensible machine learning library which consists of common learning algorithms and utilities, including classification, regression, clustering, collaborative filtering, and dimensionality reduction.

SPARK GRAPHX

GraphX is the new Spark API for graphs and graph-parallel computations. To support graph computation, GraphX exposes a set of fundamental operators such as subgraph, joinVertices, and aggregateMessages as well as an optimized variant of the Pregel API. In addition to that, GraphX also includes a collection of graph algorithms and builders to simplify the graph analytics tasks.

KEY CONCEPTS OF KUBERNETES

Key concepts of Kubernetes

At a very high level, there are three key concepts:

Pods are the smallest deployable units that can be created, scheduled, and managed. Its a logical collection of containers that belong to an application.

Master is the central control point that provides a unified view of the cluster. There is a single master node that control multiple minions.

Minion is a worker node that run tasks as delegated by the master. Minions can run one or more pods. It provides an application-specific “virtual host” in a containerized environment.

WHAT IS A ANSIBLE TOWER?

What is a Ansible Tower?

Ansible Tower (formerly ‘AWX’) is a web-based solution that makes Ansible even more easy to use for IT teams of all kinds. It’s designed to be the hub for all of your automation tasks.

Tower allows you to control access to who can access what, even allowing sharing of SSH credentials without someone being able to transfer those credentials. Inventory can be graphically managed or synced with a wide variety of cloud sources. It logs all of your jobs, integrates well with LDAP, and has an amazing browsable REST API. Command line tools are available for easy integration with Jenkins as well. Provisioning callbacks provide great support for autoscaling topologies.

WHAT IS KUBERNETES? EXPLAIN

What is Kubernetes? Explain

It is massively scalable tool for managing containers, made by Google. It is used internally on huge deployments and because of that it is maybe the best option for production use of containers. It supports self healing by restating non responsive containers, it pack containers in a way that they take less resources and has many other great features.
 
 
 
 
 
 
 
 
 

WHAT ARE ANSIBLE PLAYBOOKS?

What are ansible playbooks?

Playbooks express configuration, deployment, and orchestration in Ansible. The Playbook format is in the form of YAML. Each Playbook maps a group of hosts to a set of roles. Each role is represented by calls to Ansible call tasks.
 
 
 
 
 
 
 

WHAT IS ELASTICSEARCH

What Is ElasticSearch

ELASTICSEARCH

Elastic is an open-source search engine built on top of Apache Lucene, a complete text search engine library. Lucene is plausibly the most advanced, high performance, and perfectly featured search engine library in existence today.

Lucene is just a library. To leverage its power a user, need to work in Java and has to integrate Lucene directly with the user’s application.

Elasticsearch is also written in Java and uses Lucene internally for its indexing and searching, but its main aim is to make full-text search easily by hiding the difficulties of Lucene behind a simple, coherent, and RESTful API.

Elasticsearch is much more than just Lucene. It can also be described as follows.

  • A distributed real-time document is stored where every field is indexed and searchable.
  • It is a distributed search engine with real-time analytics.
  • Elasticsearch is capable of scaling hundreds of servers and petabytes of structured and unstructured data.
  • Elasticsearch can also be used as a replacement of document stores like MongoDB and RavenDB.
  • Elasticsearch is one of the most popular enterprise search engine which is currently being used by many organizations such as Wikipedia, The Guardian, StakOverflow GitHub and much more.

THE KEY CONCEPTS OF ELASTICSEARCH

Node: Node refers to a single running instance of Elasticsearch. Single physical and virtual server accommodate multiple nodes depending upon the capabilities of their physical resources such as RAM, storage, and processing power.

Cluster: It is an assembly of one or more number of nodes. The cluster provides collective indexing and search capabilities across all the nodes for complete data.

Index: Index is a collection of different type of documents and document properties.

Mapping: It is a collection of documents which shares common fields present in the same index

Replicas: Elasticsearch allows the user to create replicas of their own indexes and shards. Replication not only increases the availability of data but also in the case of failure, it also improves the performance of searching by carrying out a parallel search operation in these replicas.

THE POSITIVES OF ELASTICSEARCH

  • Elasticsearch is developed in Java, which makes it compatible with almost every platform.
  • Elasticsearch is real time.
  • Elasticsearch is distributed, which makes it easy to scale and integrate into any organization.
  • In Elasticsearch, creating back-ups are easy by using the concept of gateway
  • Elasticsearch supports almost every document type except those that do not support text rendering.

THE NEGATIVES OF ELASTICSEARCH

  • Elasticsearch does not contain multi-language support in terms of handling request and response data, unlike Apache Solr.
  • Elasticsearch also have a complication of split-brain situations in some rare cases.

THE VERDICT

Elasticsearch is both simple and a complex product. In this article, we have learned what is Elasticsearch and the major advantages and disadvantages. We hope, this article has given you a better understanding and more importantly, inspired you to further experiment with the rest of its great features!